Presentation 6
Presentation 6
It is used when only certain data is relevant to an investigation, saving time and storage space.
Real-Life Example:
Case: A company experiences a data breach where sensitive client records are suspected to be stolen.
Forensic Investigation Steps:
1️⃣ Investigators analyze the suspect’s work laptop but do not need the entire hard drive.
2️⃣ They create a partial volume image of the "Documents" folder, containing confidential files, instead of cloning
the whole disk.
3️⃣ Deleted file recovery tools are used on that specific volume to retrieve erased contracts and emails.
4️⃣ The recovered data provides evidence of unauthorized access and data theft, confirming the breach.
A firewall is a security system that monitors and controls incoming and outgoing network traffic based on predefined security rules. It
acts as a barrier between a trusted internal network and untrusted external networks (e.g., the internet) to prevent cyber threats.
Types of Firewalls & Their Contribution to Network Security
1️⃣ Packet Filtering Firewall
• Examines incoming and outgoing data packets based on rules (IP address, port, protocol).
• Fast & efficient Limited security (no deep inspection)
• Example: Blocks access to restricted websites by filtering specific IPs.
2️⃣ Stateful Inspection Firewall legal
• Tracks active connections and ensures only legitimate packets pass through.
• More secure than packet filtering Can slow down traffic
• Example: Allows responses from visited websites but blocks unsolicited traffic.
mistrustful,
3️⃣ Proxy Firewall (Application-Level Gateway)
• Acts as an intermediary between users and the internet, filtering requests.
• Deep content inspection Slower performance
• Example: Used in corporate networks to prevent employees from accessing malicious sites.
4️⃣ Next-Generation Firewall (NGFW)
• Combines traditional firewalls with advanced features like intrusion prevention (IPS) and deep packet inspection (DPI).
• Highly secure with real-time threat detection Expensive
• Example: Detects malware in email attachments before they reach users.
5️⃣ Cloud-Based Firewall
• Hosted on the cloud, providing security across multiple locations.
• Scalable & ideal for remote workforces Dependent on internet connectivity
• Example: Protects cloud applications from cyberattacks.
Difference Between Symmetric and Asymmetric Key Cryptography
2️⃣ Threat
What is it?
A threat is something that can cause harm to a system, like hackers, malware, or even natural disasters.
Example:
A hacker creates a virus that can steal information from computers. This virus is a threat.
3️⃣ Breach
What is it?
A breach happens when an unauthorized person gets access to a system or data.
Example:
A hacker breaks into a company’s database and steals customer information. This is a data breach.
4️⃣ Attack
What is it?
An attack is when someone tries to break into a system or steal data using different techniques.
Example:
A hacker sends fake emails to employees, tricking them into giving their passwords. This is a cyber attack.
A zombie computer is a device that has been infected with malware and is remotely controlled by a hacker without the
owner's knowledge. These compromised systems are often used in botnets to carry out large-scale cyberattacks.
How Zombies Work in Malware Attacks:
1️⃣ Infection – Malware (e.g., trojans, worms) secretly infects a computer.
2️⃣ Remote Control – Hackers use Command and Control (C&C) servers to control the zombie device.
3️⃣ Execution of Attacks – The infected device is used for:
• DDoS Attacks – Overloading servers to crash websites.
• Spam & Phishing – Sending malicious emails.
• Data Theft – Stealing sensitive user information.
Example:
A user unknowingly downloads a malicious email attachment, turning their PC into a zombie. The hacker then uses it to
send spam emails or participate in a DDoS attack.
Conclusion
Cyber evidence refers to any digital data or information that can be used as proof in a legal investigation related to
cybercrimes. It includes electronically stored information (ESI) collected from various digital sources.
Types of Cyber Evidence:
1️⃣ Emails & Messages – Fraudulent emails, chat logs, or phishing attempts.
2️⃣ Logs & Metadata – System logs, timestamps, and IP addresses.
3️⃣ Digital Files – Documents, images, or videos stored on devices.
4️⃣ Network Traffic Data – Data packets showing unauthorized access or hacking attempts.
5️⃣ Hard Drives & Storage Media – Data recovery from computers, USB drives, and cloud storage.
The CIA Triad is a fundamental model in cybersecurity that ensures the protection of digital information. It consists of
three key principles:
1️⃣ Confidentiality – Ensures that sensitive data is accessed only by authorized users.
• Example: Encryption is used to protect personal banking details.
2️⃣ Integrity – Maintains the accuracy and reliability of data, preventing unauthorized modifications.
• Example: Checksums and digital signatures verify data authenticity.
3️⃣ Availability – Ensures that data and systems are accessible when needed.
• Example: Backup servers prevent downtime during cyberattacks.
India has a rapidly expanding digital ecosystem with 1️.2+ billion mobile users, a growing internet economy, and
increasing dependence on e-governance, digital banking, and smart infrastructure. However, this expansion also
brings rising cyber threats, such as data breaches, hacking, and ransomware attacks.
To tackle these challenges, the Government of India introduced the National Cyber Security Policy (NCSP) 201️3,
aimed at strengthening the country’s cybersecurity infrastructure.
Key Aspects
Session Identification – Tracks communication between two endpoints (IP addresses, ports).
Traffic Monitoring – Analyzes data flow, duration, and patterns.
Anomaly Detection – Identifies suspicious activities like unauthorized access or data exfiltration.
Performance Optimization – Helps in troubleshooting network issues and improving efficiency.
An insider attack occurs when a trusted individual within an organization misuses their access privileges to steal,
manipulate, or destroy sensitive data or systems. This person could be an employee, contractor, or business partner
with internal access.
User Involvement No user action required for spreading Requires user action to activate
Steganography is the technique of hiding secret data inside a non-secret file or message to avoid detection. Unlike
encryption, which scrambles data into unreadable formats, steganography conceals the existence of the data itself.
SQL Injection (SQLi) is a cyber attack where hackers inject malicious SQL queries into a website’s database input
fields to gain unauthorized access, modify, or delete data. It is one of the most dangerous web security
vulnerabilities and can lead to severe data breaches.
How Does SQL Injection Work?
1️⃣ The attacker finds an input field (such as a login form, search bar, or URL parameter) on a website that directly
interacts with a database.
2️⃣ Instead of entering valid input, they enter a malicious SQL query.
3️⃣ If the application does not properly validate or sanitize input, the SQL query gets executed by the database.
4️⃣ The attacker can then view, modify, or delete data, and in severe cases, gain full control of the database.
SELECT * FROM users WHERE username = 'admin' AND IF(1=1, sleep(5), 'false');
HTTP applications are vulnerable असर ु क्षि त to various cyber threats that can compromise data integrity,
confidentiality, and availability. Securing them is crucial to protect users and organizations.